SC-200 Microsoft Security Operations Analyst, Part 2 of 9: Microsoft 365 Defender
with expert Cristian Calinescu
Course description
The SC-200 Microsoft Security Operations Analyst exam measures your ability to accomplish the following technical tasks: mitigate threats using Microsoft 365 Defender (25-30%); mitigate threats using Microsoft Defender for Cloud (25-30%); and mitigate threats using Microsoft Sentinel (40-45%) .
Prerequisites
Basic understanding of Microsoft 365, environment, security, compliance and identity products.
Windows 10/11
familiarity wit Azure services, DB, Storage
basic understanding of Scripting concepts
Meet the expert
Cristian Calinescu is a Microsoft certified Azure Solutions Architect Expert, Senior Infrastructure Engineer and Infrastructure Security Operations Manager.
Course outline
Module 2
Threat Protection with Microsoft 365 Defender (43:30)
- Introduction (00:08)
- Threat Protection with Microsoft 365 Defender (01:47)
- Introduction to Threat Protection (03:03)
- Common Threats (02:17)
- Defender Architecture (07:04)
- Incidents in Microsoft 365 Defender (00:30)
- Defender Portal (01:56)
- Demo: Defender Portal (26:33)
- Summary (00:08)
Advanced Hunting (23:26)
- Introduction (00:08)
- Advanced Hunting (06:56)
- Demo: Advanced Hunting (06:01)
- Threat Hunting (06:09)
- Threat Hunting within Network (00:06)
- Consult Microsoft Threat Experts (03:57)
- Summary (00:08)
Module 3
Remediate risks with Microsoft 365 Defender (34:33)
- Introduction (00:08)
- Remediate Risks (04:44)
- Automate - Investigate - Remediate (08:22)
- Simulate Attacks (05:51)
- Microsoft Defender for Identities (01:50)
- Monitor and Profile user Behavior Activities (02:22)
- Identify Suspicious Activities (04:55)
- Configure Microsoft Defender for Identity Sensors (06:09)
- Summary (00:08)
Azure AD Identity Protection (41:49)
- Introduction (00:08)
- Azure AD Identity Protection (01:27)
- What are Risks (02:06)
- Identity Protection Workflow (09:41)
- Investigate Risks (02:53)
- Unblock Users (03:25)
- Micrososft Defender for Cloud Apps (05:15)
- Cloud Discovery (03:28)
- Conditional Access App Control (05:38)
- Classify and Protect Sensitive Information (07:35)
- Summary (00:08)
Respond to DLP Alerts (36:05)
- Introduction (00:08)
- Respond to DLP Alerts (03:55)
- Data Loss Prevention Components (03:28)
- Demo: Alerts and Compliance Policy (09:05)
- SManage Insider Risk Management in Microsoft 365 (04:18)
- Insider Risk (01:47)
- Common Risk Scenarios (01:47)
- Risk Management Workflow (02:41)
- Manage Risk Policies (03:51)
- Demo: Risk (04:54)
- Summary (00:08)